Crypto, passwords
Hal Murray
hmurray at megapathdsl.net
Fri Jan 5 16:43:45 UTC 2018
devel at ntpsec.org said:
>> Should we fix the code that reads keys to allow text for other
>> types than MD5?
> I've had this on my mind for a while, but it seems like the kind of thing
> where we might want to float a draft RFC before implementing.
> We need to be careful here because the existing implementation has backed us
> into an odd corner; the only way to distinguish among hash types is by the
> length of the hash.
That's not the question I was trying to ask.
I was inquiring about reading keys from the keys file. You are talking about
bits on the wire.
It's actually more complicated than length==5 for MD5. The type (MD5) is
also in the keys file. I don't know what the code actually does.
I believe the plan is to switch to a type+length+body format for packet
extensions. Backward compatibility requires adding dummy extensions if
required to avoid the magic lengths the current code understands or maybe
just make the total length more than the longest of the grandfathered
lengths. (No need for NTPv5, at least for this reason.)
I just looked at the code to answer my question.
* Finally, get key and insert it. If it is longer than 20
* characters, it is a binary string encoded in hex;
* otherwise, it is a text string of printable ASCII
* characters.
If ntpq has code to read passwords from the keyboard, we should copy that
hack.
I was slightly confused by ntpkeygen making text for MD5 and hex for SHA1.
--
These are my opinions. I hate spam.
More information about the devel
mailing list